Obama cybersecurity order lacks bite, security experts say
Scaled back order a good start, but comprehensive bipartisan legislation is essential to prevent cyberattacks
Computerworld - President Barack Obama's cybersecurity executive order, announced during his State of the Union address Tuesday night, elicited guarded praise from several quarters even as it revived calls for more comprehensive bipartisan legislation to address long-term security threats.
As expected, Obama last night signed a Presidential Policy Directive requiring federal agencies and critical infrastructure owners and operators to work cooperatively to minimize cyber risks and strengthen resilience to attacks.
The order stems from what the White House has long said is the need for immediate action to protect critical assets against cyber threats because of Congress' continued failure to pass legislation.
Republicans, however, have assailed the plan to issue the order as unnecessary presidential overreach and have long maintained that the best way to address security issues is through bipartisan legislation.
BITS, the technology policy division of the influential Financial Services Roundtable, last night called the directive a constructive step forward but added that legislation is still necessary.
"While the Executive Order moves our nation forward, Congressional action is needed to effect additional fundamental improvement," the group said in a statement. "We urge Congress to build upon these actions, while not duplicating them."
"The Administration's new cyber policy is a mixed bag," said Larry Clinton, president of the Internet Security Alliance. "Its ultimate success rests on how several ambiguous policies are implemented."
The increased information sharing, and the emphasis on voluntary standards are positive steps, Clinton said in a statement. "But if the talk of partnership and incentives is just a rhetorical facade for the same approach that has failed in the Senate for the past three years, then this so-called 'new policy' will leave us where we are now: without a coherent policy in the face of ever more sophisticated cyber threats to our nation."
President Barack Obama's cybersecurity executive order elicited guarded praise from several quarters even as it revived calls for more comprehensive bipartisan legislation to address long-term security threats.
Obama's order requires that federal government agencies share cyberthreat and vulnerability information with each other and with private companies. It calls for the enablement of a national situational awareness capability for cybersecurity through better information sharing.
The executive order establishes two national critical infrastructure centers to be operated by the U.S. Department of Homeland Security (DHS). One will focus on physical infrastructure and the other on cyber infrastructure.
The centers will serve as a central point for collecting and disseminating threat information gathered by various sector specific government agencies and departments and by owners of critical infrastructure.
The centers will also be responsible for integrating, analyzing and prioritizing vulnerability and threat information from various sources including the Department of Defense, the Department of Justice and the intelligence community.
As part of this function, the DHS centers will recommend prevention and mitigation measures for critical infrastructure prior to and during a cyberattack, and will help with incident response and restoration efforts.
The executive order puts DHS in charge of planning, coordinating and implementing changes. It requires the DHS and sector-specific federal agencies to work with critical infrastructure owners and regulatory entities to develop security guidelines and metrics for measuring progress.
- DOJ's charges against China reframe security, surveillance debate
- Hacker indictments against China's military unlikely to change anything
- U.S. to formally accuse Chinese military of hacking
- Cyberattacks could paralyze U.S., former defense chief warns
- The NSA blame game: Singling out RSA diverts attention from others
- Jury still out on FISA court
- Suspected China-based hackers 'Comment Crew' rises again
- Chinese hackers master the art of lying in wait
- Spy court OK'd all U.S. wiretap requests it received in 2012
- Groups denounce FBI plan to require Internet backdoors for wiretaps
- Transforming Information Security: Future-Proofing Processes This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for...
- The Evolution of Corporate Cyberthreats Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- Establish Cyber Resiliency: Developing a Continuous Response Architecture Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Cybercrime and Hacking White Papers | Webcasts